Recent Submissions

Several knowledge resources are available both online and o line in learning technical topics.
Textbooks act as a basic reference with their general organization into sections where each
section is dedicated in explaining ...

Every Android application runs in its own virtual machine, with its own Linux user account
and corresponding permissions. Although this ensures that permissions are given as per each
application’s requirements, each ...

Each Android application (app) runs in its own virtual machine (VM), with every VM allocated
a limited heap size for creating new objects. The heap size is scarce and device dependent. The
more heap space an app uses, ...

Programs are susceptible to malformed data coming from untrusted sources. Occasionally the
programming logic or constructs used are inappropriate to handle all types of constraints that are
imposed by legal and well-formed ...

Energy has become basis of human life today. Practically, we rely on energy for everything
we do every single day. As a result, the rate of consumption of energy has increased manifold
and thereby has become a global ...

Software libraries and frameworks, consisting of a collection of Class and Interface de nitions,
provide a mechanism for code reuse by providing methods, APIs, components (generic functionality)
and a support structure ...

Software regression bugs are de ned as defects which occur, when a previously working software
feature or functionality stops behaving as intended. One of the reasons for regression bugs is
code changes or system patching ...

A RkNN (Reverse k Nearest Neighbor) set of a query q is known as the influence set of q that contains the top k influential points. This query has got a considerable amount of attention due to its importance in various ...

Increasing energy consumption of commercial buildings has motivated numerous energy tracking
and monitoring systems in the recent years. A particular area that is less explored in this domain
is that of energy apportionment ...

Buildings account for a signi cant proportion of overall energy consumption across the world.
Heating Ventilation and Air Conditioning (HVAC) typically consumes a major proportion (e.g.
32% in India) of the total building ...

Historical newspaper archives provide a wealth of information. They are of particular interest
to genealogists, historians and scholars for People Search.
In this thesis, we design a People Gazetteer from the noisy OCR ...

Mobile robots are increasingly being used for tasks like remote surveillance, sensing and
maintenance. Some of these tasks are critical and require intelligent decision making for
successful completion. It is not always ...

Penetration of GPS-enabled devices has resulted into generation of a lot of Spatial-Textual data,
which can be mined/analyzed to improve various location-based services. One such kind of data
is activity-trajectory data, ...

Sleep quality and quantity a ects an individual's personal health. Polysomnography (PSG) is
the conventional approach for sleep monitoring. PSG has several limitations in terms of sleep
monitoring by a regular user. A ...

There is a great concern about the potential for people to leak private information on social
networks. There are many anecdotal examples of this, but few quantitative studies. This
research explores the activity of ...

Existence of spam URLs over emails and Online Social Media (OSM) has become a growing
phenomenon. To counter the dissemination issues associated with long complex URLs in emails
and character limit imposed on various OSM ...

The rapid increase in popularity of location-based services have resulted in huge amount of
spatial textual data being generated by applications like Foursquare, Facebook Places, Flickr
etc. The location-based services ...

This year (2014) in the month of May, the tenure of the 15th Lok Sabha was to end and the
elections to the 543 parliamentary seats were to be held. With 813 million registered voters, out
of which a 100 million were rst ...